Sciweavers

624 search results - page 11 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
COMPSAC
2006
IEEE
15 years 3 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
COMPSAC
1997
IEEE
15 years 1 months ago
The use of industrial-strength formal methods
Formal methods are used in a surprisingly wide variety of applications and ways throughout the world. While they may still’be considered a niche market, there is growing evidenc...
Jonathan P. Bowen, Michael G. Hinchey
RE
1997
Springer
15 years 1 months ago
SOFL: A Formal Engineering Methodology for Industrial Applications
—Formal methods have yet to achieve wide industrial acceptance for several reasons. They are not well integrated into hed industrial software processes, their application require...
Shaoying Liu
81
Voted
CCS
2004
ACM
15 years 2 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ASWEC
2006
IEEE
15 years 3 months ago
Assessing Security Properties of Software Components: A Software Engineer's Perspective
The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
Khaled M. Khan, Jun Han